logo

Data And Security Article 2022

   

Added on  2022-09-18

7 Pages1100 Words25 Views
 | 
 | 
 | 
Running head: DATA AND SECURITY
DATA AND SECURITY
Name of the Student
Name of the University
Author Note:
Data And Security Article 2022_1

DATA AND SECURITY1
Table of Contents
Summary of Article.............................................................................................................2
Why the Topic is Controversial?.........................................................................................2
What are some diverse view?..............................................................................................3
What are reasons for Stakeholders for expressing their views?..........................................3
Role of Engineers................................................................................................................3
Discussion on similar Topic and changes over time...........................................................4
References............................................................................................................................5
Data And Security Article 2022_2

DATA AND SECURITY2
Summary of Article
In the last few months, Australian civil rights have faced attack. In the month April, the
data retention law of government has come into the picture. Under this law, telecommunication
organization require the organization to have the meta-data for last two-years. Meta-data is
collected from phone calls, messages, mail and activity on the internet platform. It is completely
traced by the government and is accessible by different agencies (Anon 2019). This particular
law come into picture only few weeks prior to Australia marked its privacy awareness week.
Law for data retention is found to be as one of the comprehensive and data collection in the
western world. This particular law highlights the democratic principle on which Australia is
based. The Privacy principle of Australia aims to define the personal information which is
permissible in nature. The second thing which should be considered is that metadata which is
data about data that provides description about the daily activities and movements. This
particular law is justified for the need of protecting Australian from any kind of terrorist attack.
There is a range of widely-accessible technologies for achieving the overall objective. VPN
stands for virtual private network generally hides all the browsing data and information from
different internet service providers. On April 13, the data retention law comes into action which
is often known as VPN day (Brevini 2017). Onion router is known to be free software which is
needed for protecting the anonymity of different users. It is all about concealing the internet
activity for surveillance and analysis. There is certain number application like signal and
Telegram which aims to provide data encryption solution.
Data And Security Article 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents